Xauth Users Authentication Overview - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation

XAuth Users Authentication Overview

Copyright © 2010, Juniper Networks, Inc.
For IP Pool Name, enter Global.
For Color, select magenta.
Enter comments, if desired.
Click the Add icon. Configure the following settings and click OK:
4.
For Start IP, enter 10.10.2.100.
For End IP, enter 10.10.2.180.
Click OK to save the new IP pool object. For information about how to create IP pool
5.
objects, see "Configuring IP Pools" in the Network and Security Manager Administration
Guide.
Configure the L2TP local user:
6.
In the NSM navigation tree, select Device Manager > Devices, and then double-click
the device on which you want to configure the L2TP local user. The device
configuration appears.
In the device navigation tree, select L2TP/XAuth/Local User, and then click the
Add icon. The new L2TP/XAuth User Settings dialog box appears. Configure the
following settings, and then click OK:
For User, select Adam.
For Remote Settings, select RM_L2TP.
For IP Pool, select Global.
Click OK to save your changes to the device configuration.
7.
XAuth Users Authentication Overview on page 249
L2TP and Xauth Local Users Configuration Overview on page 247
Vsys Configurations in NSM Overview on page 250
The XAuth protocol enables the device to authenticate XAuth users and/or assign IP
pools and remote settings.
An XAuth user (or user group) is a RAS user who authenticates when connecting to the
security device using an AutoKey IKE VPN tunnel. Although both IKE and XAuth users
can authenticate through an AutoKey IKE VPN tunnel, the authentication of IKE users is
actually the authentication of VPN gateways or clients, while the authentication of XAuth
users is the authentication of the individuals themselves. XAuth users must enter
information that only they are supposed to know—their username and password.
You can also assign an XAuth user IP, WINS, and DNS addresses from the device. When
you assign the XAuth user or user group a remote setting and IP pool at the device level,
the settings override the remote settings and IP pool assigned to the VPN.
Chapter 8: Configuring VPNs
249

Advertisement

Table of Contents
loading

Table of Contents